What is the biggest attack in GBPS you stopped
-
Yes. It just doesnt work as expected.
Until the drop in traffic occurs. So I need to find a way to see whats initiated when the traffic drops.
https://forums.freebsd.org/forums/networking.7/
-
Yes….one more forum to watch....................... :D
-
Just a small update..
Changed NIC's to vmxnet3 in vmware and this happened.
Same traffic drop but curves are different. On E1000 they follow each other. On vmxnet3 they are totally seperated. Red is 15mbit/s and black is almost zero.
Suddenly then traffic drops on incoming WAN and it begins to flow traffic and respond to ping for Google DNS.
No change what so ever to anything.
vmxnet3 drivers are much worse handling this kind of attack than the E1000 drivers.
EDIT: When Core nr 3 drops, the FW comes alive and begins to route packets. Overall load is cut in half.
EDIT EDIT: Getting 100% interrupt in the top -HSP on the console. Again the E1000 almost had zero.
Logs are flooded with this.
| Jun 7 19:54:14 | check_reload_status: Reloading filter |
| Jun 7 19:54:14 | check_reload_status: Restarting OpenVPN tunnels/interfaces |
| Jun 7 19:54:14 | check_reload_status: Restarting ipsec tunnels |
| Jun 7 19:54:14 | check_reload_status: updating dyndns Yousee |
| Jun 7 19:54:01 | kernel: vmx0: watchdog timeout on queue 0 |
| Jun 7 19:53:49 | kernel: vmx0: watchdog timeout on queue 0 |
| Jun 7 19:53:43 | kernel: vmx0: watchdog timeout on queue 0 |
| Jun 7 19:53:38 | kernel: vmx0: watchdog timeout on queue 0 |
| Jun 7 19:53:33 | kernel: vmx0: watchdog timeout on queue 0 |
| Jun 7 19:53:28 | kernel: vmx0: watchdog timeout on queue 0 |
| Jun 7 19:53:22 | kernel: vmx0: watchdog timeout on queue 0 |
| Jun 7 19:53:15 | kernel: vmx0: watchdog timeout on queue 0 |
| Jun 7 19:53:06 | kernel: vmx0: watchdog timeout on queue 0 |
| Jun 7 19:53:01 | kernel: vmx0: watchdog timeout on queue 0 |
| Jun 7 19:52:56 | kernel: vmx0: watchdog timeout on queue 0 |
| Jun 7 19:52:51 | kernel: vmx0: watchdog timeout on queue 0 |
| Jun 7 19:52:45 | kernel: vmx0: watchdog timeout on queue 0 |
| Jun 7 19:52:40 | kernel: vmx0: watchdog timeout on queue 0 |
| Jun 7 19:52:35 | kernel: vmx0: watchdog timeout on queue 0 |
| Jun 7 19:52:28 | kernel: vmx0: watchdog timeout on queue 0 |
| Jun 7 19:52:23 | kernel: vmx0: watchdog timeout on queue 0 |
| Jun 7 19:52:18 | kernel: vmx0: watchdog timeout on queue 0 |
| Jun 7 19:52:13 | kernel: vmx0: watchdog timeout on queue 0 |
| Jun 7 19:52:07 | kernel: vmx0: watchdog timeout on queue 0 |
| Jun 7 19:52:02 | kernel: vmx0: watchdog timeout on queue 0 |
| Jun 7 19:51:56 | kernel: vmx0: watchdog timeout on queue 0 |
| Jun 7 19:51:50 | kernel: vmx0: watchdog timeout on queue 0 |
| Jun 7 19:51:46 | kernel: vmx0: watchdog timeout on queue 0 |
| Jun 7 19:51:40 | kernel: vmx0: watchdog timeout on queue 0 |
| Jun 7 19:51:34 | kernel: vmx0: watchdog timeout on queue 0 |
| Jun 7 19:51:29 | kernel: vmx0: watchdog timeout on queue 0 |
| Jun 7 19:51:24 | check_reload_status: Reloading filter |
| Jun 7 19:51:24 | check_reload_status: Restarting OpenVPN tunnels/interfaces |
| Jun 7 19:51:24 | check_reload_status: Restarting ipsec tunnels |
| Jun 7 19:51:24 | check_reload_status: updating dyndns Yousee |
| Jun 7 19:51:22 | kernel: vmx0: watchdog timeout on queue 0 |
| Jun 7 19:51:16 | kernel: vmx0: watchdog timeout on queue 0 |
| Jun 7 19:51:11 | kernel: vmx0: watchdog timeout on queue 0 |
-
And an update from me.
Currently downloading and getting 5.42Mbps according to the dashboard, yet when you did the ddos the otherday that was only giving showing 2.42Mbps.
So why does a ddos cause my bandwidth to drop down? Could it be related to this post https://forum.pfsense.org/index.php?topic=94903.0 ie a hw issue, or is freebsd or pfsense.
I have a huwei supplied router dont know if it can go into modem only mode, but if it can I will check the speeds again with this device if you dont mind doing a Britney Spears and hit me one more time? ;)
-
No problem.
Let me know when youre ready and what IP/port it is.
-
.-….........
-
How resilient? No longer an issue for established connections as long as there is enough bandwidth, kind of resilient? You tone makes it sound as if it is effectively fixed. Time to party? 8)
-
EDIT: It was my bandwith that caused to attacked IP to survive.
No change in resilience. (Sorry).
-
EDIT: It was my bandwith that caused to attacked IP to survive.
No change in resilience. (Sorry).
It was your bandwidth? Isn't that the goal? The weakest link should be the bandwidth, not the firewall, yes? What issue(s) still remain? Same?
-
As soon as I was able to push 10mbit/s out on my private line, then it failed again….
-
So 10Mb/s of special traffic against your greater than 10Mb/s link caused the link to fail? Did the firewall stop working or only the link go down?
-
Firewall stopped routing traffic. Link was fine.
Lots of packetloss once again.
-
So same issue as before, firewall is the weakest link, not the bandwidth? Maybe 2.3.
Any news from the FreeBSD side of things?
-
Not yet. They are digesting the attack that I did yesterday and curretnly looking at states not beeing freed as they should…. AFAIK.
-
Did this end up in nowhere with the issue still being there?
-
Still working on it.
-
https://lists.freebsd.org/pipermail/freebsd-announce/2015-July/001655.html
Latest update.
-
https://lists.freebsd.org/pipermail/freebsd-announce/2015-July/001655.html
Latest update.
Does this need to be included in 2.2.4 before it is released?
-
That would be a very good idea if possible!
Opnsense has this fix done allready and a full release on friday.
-
Do they have snapshot that you could test?